pindrop-logo-2.svg
Search
Close this search box.
Search
Close this search box.

Credit Card Gangs Using Online Courses to Recruit Potential Fraudsters

By Jonah Berg-Ganzarain Credit card fraud gangs are becoming more strategic in their efforts to exploit the public. These groups are expanding their operation to create remote learning courses, teaching potential fraudsters how to succeed, according to a new report from Digital Shadows. In a report released this week, Digital Shadows combed through hundreds of criminal forums […]

Apple Fixes Broadpwn Bug in iOS 10.3.3

In the latest version of iOS Apple has patched dozens of serious security flaws, including the Broadpwn vulnerability in some Broadcom WiFi chips, and a number of remote code execution bugs in various components of the OS. Not many details of the Broadpwn vulnerability are public yet, but it’s considered a fairly serious issue. Google […]

Mozilla Wants to Build an Open Voice Engine

With manufacturers weaving voice control into a wide variety of devices, from phones to cars to home assistants, the accuracy of the voice-recognition engines in those products is becoming vital. Mozilla is hoping to help improve that accuracy with the release of its new Common Voice project. The new initiative is a response to the […]

National Security Letter Gag Orders Legal, Appeals Court Rules

In a decision that has drawn the ire of technology providers and privacy advocates, a United States appeals court has ruled that National Security Letters and the gag orders that often come with them don’t violate the First Amendment. The ruling came down Monday and from the Ninth Circuit Court of Appeals and the result is […]

GhostCtrl Android Malware Hijacks Audio, Roots Devices

A recently discovered piece of Android malware called GhostCtrl apparently evolved from the well-known OmniRAT tool for desktop platforms and has the ability to steal or delete a wide variety of user and device data. GhostCtrl has an interesting pedigree and history. The backdoor is connected to a data-stealing worm known as Retadup that was detected […]

New Data Shows Attackers Focusing More Attention on iOS

A new report released this morning by Skycure shows that attackers are beginning to focus more and more of their attention on iOS, even as attacks on Android are leveling out . This would be the first time in iOS’s 10 year history that attacks on that platform have outpaced that of its main competitor, Google’s Android. The image […]

Cisco Fixes Remote Code Execution Flaw in WebEx Extensions

Cisco has patched a serious remote code execution flaw in its WebEx extensions for both Google Chrome and Mozilla Firefox, a bug that could be exploited quite easily. The vulnerability affects several different browser extensions produced by WebEx, including the Cisco WebEx Meetings Server, Cisco WebEx Centers (Meeting Center, Event Center, Training Center, and Support Center), and Cisco […]

FCC Targets Robocalls Anew

As part of its strategy to stop unwanted and illegal robocalls, the FCC is opening an inquiry into the way that providers reassign phone numbers and how they can help prevent customers from receiving robocalls intended for other people. The problem arises when one customer gives up a phone number, whether it’s a landline or […]

Phone Fraud | Damaged Trust

How Phone Fraud by Actresses Damages Customer Trust in Businesses Breaches and fraud cost businesses their reputations. If you can’t protect your customers’ data – or their money – then how can you expect to earn their trust? But sometimes keeping customers safe and maintaining operational efficiency can tug the business in opposite directions. In […]